Monero Transaction 05d702b8adb7abfadd084cf43dac420d417d56ba83b20c886d4dbcbcd69c5c6d

Autorefresh is OFF

Tx hash: 05d702b8adb7abfadd084cf43dac420d417d56ba83b20c886d4dbcbcd69c5c6d

Tx prefix hash: 3399dc757630e1058cf45b3b708d34a29556ba21fd3d1e4372a3d7f314f6e0da
Tx public key: 9d591e8d78a0f02b6bb4589cc50799e73c7218a4da7ac6bb0b1771ff674a84a4

Transaction 05d702b8adb7abfadd084cf43dac420d417d56ba83b20c886d4dbcbcd69c5c6d was carried out on the Monero network on 2016-12-01 15:13:28. The transaction has 2095285 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1480605208 Timestamp [UTC]: 2016-12-01 15:13:28 Age [y:d:h:m:s]: 07:358:03:53:56
Block: 1191864 Fee (per_kB): 0.010000000000 (0.013726541555) Tx size: 0.7285 kB
Tx version: 1 No of confirmations: 2095285 RingCT/type: no
Extra: 019d591e8d78a0f02b6bb4589cc50799e73c7218a4da7ac6bb0b1771ff674a84a4de20479169cee2d598b0562ab831ad7d07ac4dfe6c76d88f3902bb7404c538fa6060

5 output(s) for total of 2.080000000000 xmr

stealth address amount amount idx tag
00: d250c92658a0d7fe966f2822aaf45a0eeb2ef5d4be4f482675f25d1136914a83 0.003000000000 73121 of 90176 -
01: 805c19726259239ed81ef8da06c344cce2bf0f43bb74c2bcab6126b9253b2662 0.007000000000 229397 of 247340 -
02: bdefc12cb2c4cfed37de4dc07755880d2b724edb6a343056d3a50e711b794fa4 0.030000000000 305380 of 324336 -
03: b9f86d45fc4f0bfe5cf21f915a2c492d1cc2625799832b9400ac96ae4b7b1677 0.040000000000 275300 of 294095 -
04: 62d9801a008a14f0e75c91bbdf00562305f9880df7caec046ad48ceb8b852872 2.000000000000 418317 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-21 06:05:50 till 2016-12-01 16:00:44; resolution: 5.26 days)

  • |_*__________________________________*____________________________________________________________________________________________________________________________________*|
  • |_*_________*_____________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 2.090000000000 xmr

key image 00: cbd6a7a630c1929ff168a3a7fea7ab2f0f1b35d8f8300ebf26f3defc5899f8b2 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5f539560d144c2b9c7caa08a31f374029c055784489d6aeb07803041835a8e8c 00098080 1 5/2 2014-06-23 12:26:11 10:155:06:41:13
- 01: 38d78aeda243e46f16da3b7bfc9b4602acc57eeb6d1f3fa2e714f20f37a60b5b 00361673 0 0/4 2014-12-24 12:32:53 09:336:06:34:31
- 02: 12378561ad4c939f2b79e37da9041671a2019f81d3a59ca1460e0a85b9aec5b4 01191527 3 1/4 2016-12-01 04:56:11 07:358:14:11:13
key image 01: 9c9be3c8c5a5e2ed252ffcc999a482af539de03274b98079ab72fb06a2b6f8fb amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7c62f22e2dc15e931fdbdbc98bcbb7112ca6b3e5abf8acb84dfcf6557c9c731c 00094815 1 9/147 2014-06-21 07:05:50 10:157:12:01:34
- 01: 61253b3eb2299262242277d6dab9e0fa60e35bdc60182ceb4a3a1e79bf0ea19e 00173709 3 13/29 2014-08-15 01:30:39 10:102:17:36:45
- 02: e1cef1f95cbc941c46f9e9ca72c70cac2675ec50ad9ca8bd77d213c483d174c3 01191854 3 2/21 2016-12-01 15:00:44 07:358:04:06:40
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2000000000000, "key_offsets": [ 19483, 164429, 234291 ], "k_image": "cbd6a7a630c1929ff168a3a7fea7ab2f0f1b35d8f8300ebf26f3defc5899f8b2" } }, { "key": { "amount": 90000000000, "key_offsets": [ 61282, 43957, 181876 ], "k_image": "9c9be3c8c5a5e2ed252ffcc999a482af539de03274b98079ab72fb06a2b6f8fb" } } ], "vout": [ { "amount": 3000000000, "target": { "key": "d250c92658a0d7fe966f2822aaf45a0eeb2ef5d4be4f482675f25d1136914a83" } }, { "amount": 7000000000, "target": { "key": "805c19726259239ed81ef8da06c344cce2bf0f43bb74c2bcab6126b9253b2662" } }, { "amount": 30000000000, "target": { "key": "bdefc12cb2c4cfed37de4dc07755880d2b724edb6a343056d3a50e711b794fa4" } }, { "amount": 40000000000, "target": { "key": "b9f86d45fc4f0bfe5cf21f915a2c492d1cc2625799832b9400ac96ae4b7b1677" } }, { "amount": 2000000000000, "target": { "key": "62d9801a008a14f0e75c91bbdf00562305f9880df7caec046ad48ceb8b852872" } } ], "extra": [ 1, 157, 89, 30, 141, 120, 160, 240, 43, 107, 180, 88, 156, 197, 7, 153, 231, 60, 114, 24, 164, 218, 122, 198, 187, 11, 23, 113, 255, 103, 74, 132, 164, 222, 32, 71, 145, 105, 206, 226, 213, 152, 176, 86, 42, 184, 49, 173, 125, 7, 172, 77, 254, 108, 118, 216, 143, 57, 2, 187, 116, 4, 197, 56, 250, 96, 96 ], "signatures": [ "820cead8054530fad19c4379ec873812599159e436ebc099593a792a3c72a4084dee9adc8b0f326645e2c111d7a96f2892223b0770435a49c2841b9aaf706e0301c6b73f42d7a5c4f7de77c83bc37c898a0529c6842f6ee657226d88f0a700082e137c41d8fa7192d9f14b288da69dd5d8fc8b10778027635c4132297adaa601d58b5b36a3cd98b92eea2abfb30934e8f14ac2af4b48f6fe87cfd35fe3122205bcb45fb074ef58cf460aab7b1471ba64b56aee7e9d21932a4d39de5e6e0dbb04", "906c0782e20dee1181deca34809f5ae0765ba07ff55af31f1212b8c223945d026f52fc1a34d00702678c86a5244620e9f5a46e3ace4a8561e476579274c49b04a92611e49c336cebf0f895a84e2138a230ace6681760666319266e75ad52040b6a041b51d73b1e2bacd19be7c75e14f932246e899293df2cfb4b3d64fc28a50d9f066648fa2a2a09a667d0579256811a0d2d6d44be711e204ae25b74f6f58d03b04d49111b8a57fb2aaa5946a9fb0478f4152b00e525eebcb3ba93638f41ab04"] }


Less details
source code | moneroexplorer